An official website of the United States government
Here's how you know
Official websites use .gov
A
.gov
website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A
lock (
lock
)
or
https://
means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Skip to main content (Press Enter).
Toggle navigation
National Security Agency/Central Security Service
NSA/CSS
Search
Search NSA:
Search
Search NSA:
Search
About
Leadership
Mission & Combat Support
Cybersecurity
Signals Intelligence
Central Security Service
Locations
Research
Cybersecurity Collaboration Center
Collaborative Partnerships
Enduring Security Framework
DIB Cybersecurity Services
Standards and Certifications
Artificial Intelligence Security Center
Press Room
Press Releases & Statements
News & Highlights
Podcast
Declassification & Transparency Initiatives
Cybersecurity Advisories & Guidance
Telework and Mobile Security Guidance
DoD Microelectronics Guidance
Research Publications
Careers
Innovation
WorkLifeBalance
History
National Cryptologic Museum
Cryptologic History
National Cryptologic Memorial
Search
Search
Upload Date
Upload Date
Document Date
Title
NSA Cybersecurity Academic Strategy
CSI: Use Secure Cloud Identity and Access Management Practices
CSI: Account for Complexities Introduced by Hybrid Cloud and Multi-Cloud Environments
CSI: Manage Cloud Logs for Effective Threat Hunting
CSI: Uphold the Cloud Shared Responsibility Model
CSI: Secure Data in the Cloud
CSI: Implement Network Segmentation and Encryption in Cloud Environments
CSI: NSA’s Top Ten Cloud Security Mitigation Strategies
CSI: Mitigate Risks from Managed Service Providers in Cloud Environments
CSI: Use Secure Cloud Key Management Practices
CSI: Enforce Secure Automated Deployment Practices through Infrastructure as Code
CSI: Advancing Zero Trust Maturity Throughout the Network and Environment Pillar
CSA: Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations
CSA: SVR Adapt Tactics for Initial Cloud Access
CTR: Joint Guidance: Identifying and Mitigating Living Off the Land Techniques
CSA: PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
CSI: Engaging with Artificial Intelligence
NSA 2023 Cybersecurity Year in Review
CSI: Recommendations for Software Bill of Materials (SBOM) Management (Jan 2024 Update)
Cryptologic Quarterly Vol. 41
FIRST
2
3
4
(current)
5
6
LAST